Submit Search
Upload
Fraud webinar - Prevention & Risk Management
•
0 likes
•
29 views
Fernando Mesa
Follow
MarkLogic Webinar on Fraud Prevention and Risk Management
Read less
Read more
Technology
Report
Share
Report
Share
1 of 21
Download now
Download to read offline
Recommended
Privacy and Security by Design
Privacy and Security by Design
Unisys Corporation
The BYOD Security Battleground
The BYOD Security Battleground
Watchful Software
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
Peter Procházka
Data Leakage Presentation
Data Leakage Presentation
Mike Spaulding
Information Leakage & DLP
Information Leakage & DLP
Yun Lu
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
Sagara Gunathunga
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLT
Omid Mogharian
Recommended
Privacy and Security by Design
Privacy and Security by Design
Unisys Corporation
The BYOD Security Battleground
The BYOD Security Battleground
Watchful Software
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
Peter Procházka
Data Leakage Presentation
Data Leakage Presentation
Mike Spaulding
Information Leakage & DLP
Information Leakage & DLP
Yun Lu
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
Sagara Gunathunga
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLT
Omid Mogharian
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
Claudiu Popa
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
Internet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Gosia Fraser
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
Craig Adams
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
John Eckman
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
Druva
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
Jerry Paul Acosta
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
Network Intelligence India
Privacy by Design: White Papaer
Privacy by Design: White Papaer
Kristyn Greenwood
The X Factor in Data Centric Security
The X Factor in Data Centric Security
Watchful Software
Big data security the perfect storm
Big data security the perfect storm
Ulf Mattsson
Network Security and Big Data Analytics
Network Security and Big Data Analytics
Allot Communications
Cyber and Data Risks
Cyber and Data Risks
risksmith
Putting data science into perspective
Putting data science into perspective
Sravan Ankaraju
Customer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 Days
Digital Guardian
Bankinfonews
Bankinfonews
Vikram Kalkat
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
Mark logic ediscovery and governance v1
Mark logic ediscovery and governance v1
Fernando Mesa
MarkLogic Semantic use cases
MarkLogic Semantic use cases
Fernando Mesa
More Related Content
What's hot
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
Claudiu Popa
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
Internet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Gosia Fraser
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
Craig Adams
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
John Eckman
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
Druva
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
Jerry Paul Acosta
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
Network Intelligence India
Privacy by Design: White Papaer
Privacy by Design: White Papaer
Kristyn Greenwood
The X Factor in Data Centric Security
The X Factor in Data Centric Security
Watchful Software
Big data security the perfect storm
Big data security the perfect storm
Ulf Mattsson
Network Security and Big Data Analytics
Network Security and Big Data Analytics
Allot Communications
Cyber and Data Risks
Cyber and Data Risks
risksmith
Putting data science into perspective
Putting data science into perspective
Sravan Ankaraju
Customer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 Days
Digital Guardian
Bankinfonews
Bankinfonews
Vikram Kalkat
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
What's hot
(20)
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
Internet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
Privacy by Design: White Papaer
Privacy by Design: White Papaer
The X Factor in Data Centric Security
The X Factor in Data Centric Security
Big data security the perfect storm
Big data security the perfect storm
Network Security and Big Data Analytics
Network Security and Big Data Analytics
Cyber and Data Risks
Cyber and Data Risks
Putting data science into perspective
Putting data science into perspective
Customer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 Days
Bankinfonews
Bankinfonews
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
Similar to Fraud webinar - Prevention & Risk Management
Mark logic ediscovery and governance v1
Mark logic ediscovery and governance v1
Fernando Mesa
MarkLogic Semantic use cases
MarkLogic Semantic use cases
Fernando Mesa
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
Inside Analysis
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
Neo4j
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
Sal Marcus
CTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINAL
Robert J. Abate, CBIP, CDMP
5 keys to high availability applications
5 keys to high availability applications
Lee Atchison
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
Rod Soto
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
magnificbsr
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
magnificsmile
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
babymagnific
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
magnificsmily
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
magnificsairam
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
magnifics
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
magnificbsr
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
magnificsairam
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
magnificsmily
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
babymagnific
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
magnificsmile
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
babymagnific
Similar to Fraud webinar - Prevention & Risk Management
(20)
Mark logic ediscovery and governance v1
Mark logic ediscovery and governance v1
MarkLogic Semantic use cases
MarkLogic Semantic use cases
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
CTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINAL
5 keys to high availability applications
5 keys to high availability applications
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion soa operations and configuration
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
Recently uploaded
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
MarianaLemus7
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Recently uploaded
(20)
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Fraud webinar - Prevention & Risk Management
1.
Slide 1 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 1 Today’s Webinar Gov’t CTO MarkLogic Chris Biow Digital Media Specialist MarkLogic Diane Burley Principal Technologist MarkLogic Fernando Mesa Prevention & Risk Management What you can learn from intelligence agencies #MarkLogic
2.
Slide 2 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 2 Challenges in Government Intel Extreme Data — Gartner term for: § Multiple data sources, schemas § Security & privacy concerns § Many languages & standards – not all western § Rapidly changing information § Need for real time updates § Many different constituencies for information – each wanting data presented “the right way” § High stakes of failure Sound familiar?
3.
Slide 3 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 3 Mission Accomplishment in Gov’t § Combine and provide information on known threat persons § Identify threats recorded within large feeds of sensor data § Intelligence analysis of enriched Open Source information (OSINT) § Expose insider threat § Consolidate all sources of land-use information, including unstructured § Enable secure sharing and discovery of sensitive information § Open government information to the public § Enable cyber defense by tracking all IT assets Time to “Mission” / Market
4.
Slide 4 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 4 Pressure for Real-Time § Radically reduced human effort § Time to first capability § 1/3 the time § Weekend § Fast, progressive refinement § Ease of development § Ease of maintenance § Breadth of requirements § Combining sources § Consistent view § Reduced machine effort § Zero latency analytics § More data per server § Scalable cloud of servers § Alerting Time to Mission System Response Time
5.
Slide 5 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 5 Time can be on your side Changing the way we deliver information. Design Develop Add new data sources Load data Time Traditional approaches
6.
Slide 6 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 6 Real-time Alert § Ordinary search/query § Save and index the documents/records § Run a query § Get the result docs/recs § Alerting § Save and index the queries with related actions § Event: alert § Criterion: annotation § Relationship: connection § Destination: routing § Run a new document/record § Get the matching queries § Perform their actions The other facet of MarkLogic in Real Time
7.
Slide 7 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 7 Why MarkLogic for Intelligence § Universal Repository – XML at its Core § Relational data § Hierarchical data § GIS § Text § Fast Access to Information – Search Engine § We Index Everything § Nothing our customers have seen runs faster § Can you use Google? § An Interface our Customers Choose § Our Application Interface lets you connect to your systems or § Use our own front end
8.
Slide 8 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 8 Federal HC Data Concerns § Extremely disparate formats § Vast number of data domains § Difficult to transform, merge and manipulate § Time crunch § Many proprietary standards (and multiple versions) § Difficult to manage and audit § Error ridden
9.
Slide 9 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 9 Where MarkLogic Helps in Fraud § Data Integration Resource § Single Client View § MMIS Data & other Social Services Resources § GIS Integration § Complex Security Support (ala HIPAA) § Information Sharing Platform § Social Media friendly § Expose the information you want
10.
Slide 10 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 10 Fraud in the Commercial Sector § Life Sciences § Off-label sales and marketing § Health Insurance § Social Network Analysis for Fraud Detection Uses cases in Fraud, Waste and Misuse
11.
Slide 11 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 11 Off-label Sales and Marketing Characteristics § Integrate Extreme data § Rapidly changing information § Complex Analytics § Real time monitoring § Expose in unique ways (custom) § High stakes of failure Analyzing, monitoring and reporting on internal fraud
12.
Slide 12 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 12 Correlate different points of information
13.
Slide 13 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 13 Correlate different points of information
14.
Slide 14 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 14 Monitor & Alert on Suspicious Patterns
15.
Slide 15 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 15 Monitoring off-label practices: Business Outcome § Increase Compliance § Monitor and expose deviations in prescription patterns that may be attributed to illegal sales or marketing activities. § Fewer human resources § The system can reveal commonalities among thousands of cases, identifying potentially suspicious activities that the human eye would miss. § Increase Revenue § Using the same technology the system can monitor and alert against fraud but also can spot trends in market usage from the correlation and analysis of company, web and social data. Why it matters to your business
16.
Slide 16 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 16 Healthcare Claims Fraud § Social Network Analysis – § MINE social network content from publicly available sites & health insurance claim information. § CORRELATE internal & external data (both structured and unstructured) to detect possible fraud, abuse and unnecessary overuse. § Uniquely COMBINE repository, monitoring, analytics and presentation capabilities, to identify potentially fraudulent and abusive behavior before a claim is paid or, retrospectively, analyze providers' past behaviors to flag suspicious patterns. Social Network Analysis for Fraud detection
17.
Slide 17 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 17 Social Network Analysis
18.
Slide 18 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 18 Social Network Analysis
19.
Slide 19 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 19 Best Practices § Flexible integration should be at the core § Complete Analysis is near impossible without the ability to ingest easily disparate data sources: relational, hierarchical, GIS, Text. § Design for the unpredictable § Information changes fast, so do the questions that the system needs to answer. Best to build a platform with unpredictability in mind. § Harness the collective intelligence of your data and SMEs § Build a system that can take advantage of the shared knowledge that is generated from your user base. § Speed matters § Real-time performance is not a nice-to-have anymore. Fast performance allows for pro-active measures. What we can learn from military intelligence
20.
Slide 20 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 20 Questions? Go’vt CTO MarkLogic Chris Biow Digital Media Specialist MarkLogic Diane Burley Principal Technologist MarkLogic Fernando Mesa Submit questions via Q&A panel … MarkLogic webcasts are available online! www.marklogic.com/webinars
21.
Slide 21 Copyright
© 2011 MarkLogic® Corporation. All rights reserved.Slide 21 Thank you! For more information on this webinar: Chris Biow – Chris.Biow@marklogic.com Fernando.Mesa – Fernando.Mesa@marklogic.com Diane Burley – diane.burley@marklogic.com MarkLogic webcasts are available online! www.marklogic.com/webinars
Download now